The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Secure air transportation is vital for economy and society and it relies heavily on airport security screening. Passenger bags and other belongings are screened using X-ray machines to ensure that they do not contain prohibited items. Human operators (X-ray screeners) visually inspect X-ray images to decide whether they are harmless or whether they might contain a prohibited item and therefore require...
Mutual variation of the received signal which occurs as a consequence of the channel reciprocity property has recently been proposed as a viable method for secret key generation. However, this cannot be strictly maintained in practice as the property is applicable only in the absence of interference. To ensure the propagation defined key remains secret, one requirement is that there remain high degrees...
Secret key generation from the randomness provided by random channels is currently considered as one way to improve security in wireless communications at the physical layer level. However, the relation between the performance of SKG schemes and the characteristics of the radio channel has been moderately investigated. In this work, we evaluate the security performance through a simple channel model...
The goal of this work is to establish the accuracy of ray tracing to simulate the radio channel in a Physical Layer Security scenario, where two legitimate users try to take advantage of the intrinsic properties of the channel to generate a shared secret key inaccessible to an eavesdropper. A 3D Ray-Tracing software, including a diffuse scattering model, is employed to simulate spatial correlations...
We propose a high-dimensional quantum key distribution protocol secure against photon-number splitting attack by employing only one or two decoy states. Decoy states dramatically increase the protocol's secure distance.
The network traffic classification is one of the most fundamental work in the network measurement and management, and this problem is more and more impact as the network scale grows. Many methods are proposed by researchers, but methods based on flow statistics seem more popular than the others. In this paper, we proposed a novel method based on refined flow statistical features. The new statistics,...
Nowadays, electronics systems design is a complex process. A design-and-reuse model has been adopted, and the vast majority of designers integrates third party intellectual property (IP) cores in their design in order to reduce time to market. Due to their immaterial form and high market value, IP cores are exposed to threats such as cloning and illegal copying. In order to fight these threats, we...
Sensor networks use binary measurements and state estimations for several reasons, including communication and processing overheads. Such a state estimator is vulnerable to attackers that can hijack a subset of the sensors in an effort to change the state estimate. After exhibiting a simulation that demonstrates the possible effect of integrity cyberphysical systems, this paper extends the authors'...
Recently, some statistically optimal steganalyzers are proposed based on hypothesis testing theory, in which the cover pixels are supposed to be independent. However, the independent assumption is of limited interest since redundancy exists in natural images. In this paper, using a more appropriate image model considering pixel correlation, a new steganaly-sis method for the least significant bit...
This paper considers optimal multi-carrier (multiple messages) spread-spectrum (SS) data embedding on linearly-transformed host. We present information-theoretic security analysis for the optimal SS embedding. The security is quantified by both the Kullback-Leibler distance and Bhat-tacharyya distance between the cover and stego probability distributions. The main results of this paper permit to establish...
Online review plays an important role when people are making decisions to purchase a product or service. It is shown that sellers can benefit from boosting their product review or downgrading their competitors' product review. Dishonest behavior on reviews can seriously affect both buyers and sellers. In this paper, we introduce a novel angle to detect dishonest reviews, called Equal Rating Opportunity...
This paper presents an efficient encryption technique for image. The designed chaos-based key generator provides a random and complex dynamic behavior and can change it automatically via a random-like switching rule. The proposed encryption scheme is called PDCSS (Parametric Discrete Chaos-based Switching System). The performances of this technique were evaluated in terms of data security. The originality...
The increasing number of services available in the cloud market make them plausible and attractive for building Cloud Service Compositions (CSC). However, performance instability is common in the cloud environment due to changes in supply and demand of shared computational infrastructure and resources. Candidate compositions are vulnerable to such instability. We propose a novel approach to improve...
With the requirement for remote control of unmanned aerial vehicles (UAV) becoming more frequent in scenarios where the environment is inaccessible or hazardous to human beings (e.g. disaster recovery); remote functionality of a UAV is generally implemented over wireless networked control systems (WNCS). The nature of the wireless broadcast allows attackers to exploit security vulnerabilities through...
We consider the problem of diluting common randomness from correlated observations by separated agents. This problem creates a new framework to study statistical privacy, in which a legitimate party, Alice, has access to a random variable X, whereas an attacker, Bob, has access to a random variable Y dependent on X drawn from a joint distribution pX,Y. Alice's goal is to produce a non-trivial function...
We study the problem of constructing secure regenerating codes that protect data integrity in distributed storage systems (DSS) in which some nodes may be compromised by a malicious adversary. The adversary can corrupt the data stored on and transmitted by the nodes under its control. The “damage” incurred by the actions of the adversary depends on how much information it knows about the data in the...
This paper analyses the unlinkability and the irreversibility of the iris biometric template protection system based on Bloom filters introduced at ICB 2013. Hermans et al. presented at BIOSIG 2014 an attack on the unlinkability of these templates. In the worst case, their attack succeeds with probability at least 96%. But in their attack, they assume protected templates generated from the same iriscode...
Security tools have evolved dramatically in the recent years to combat the increasingly complex nature of attacks, but to be effective these tools need to be configured by experts that understand network protocols thoroughly. In this paper we present FieldHunter, which automatically extracts fields and infers their types; providing this much needed information to the security experts for keeping pace...
As developers face ever-increasing pressure to engineer secure software, researchers are building an understanding of security-sensitive bugs (i.e. Vulnerabilities). Research into mining software repositories has greatly increased our understanding of software quality via empirical study of bugs. However, conceptually vulnerabilities are different from bugs: they represent abusive functionality as...
Programmable Logic Controller (PLC) technology plays an important role in the automation architectures of several critical infrastructures such as Industrial Control Systems (ICS), controlling equipment in contexts such as chemical processes, factory lines, power production plants or power distribution grids, just to mention a few examples. Despite their importance, PLCs constitute one of the weakest...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.